City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 44.0.0.0 - 44.191.255.255
CIDR: 44.128.0.0/10, 44.0.0.0/9
NetName: AMPRNET
NetHandle: NET-44-0-0-0-1
Parent: NET44 (NET-44-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amateur Radio Digital Communications (ARDC)
RegDate: 1992-07-01
Updated: 2024-11-07
Comment: Geofeed https://portal.ampr.org/storage/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/44.0.0.0
OrgName: Amateur Radio Digital Communications
OrgId: ARDC
Address: 5663 Balboa Ave Suite 432
City: San Diego
StateProv: CA
PostalCode: 92111-2705
Country: US
RegDate:
Updated: 2025-01-17
Ref: https://rdap.arin.net/registry/entity/ARDC
OrgTechHandle: LEWIS1112-ARIN
OrgTechName: Lewis, Adam
OrgTechPhone: +1-858-477-9908
OrgTechEmail: adam@ardc.net
OrgTechRef: https://rdap.arin.net/registry/entity/LEWIS1112-ARIN
OrgAbuseHandle: BURWE9-ARIN
OrgAbuseName: Burwell, John
OrgAbusePhone: +1-858-477-9900
OrgAbuseEmail: john@ardc.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/BURWE9-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.121.44.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.121.44.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040602 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 07:28:20 CST 2026
;; MSG SIZE rcvd: 106
Host 150.44.121.44.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 150.44.121.44.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 93.174.95.106 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2019-10-08 03:17:45 |
| 46.39.223.165 | attackspam | Automatic report - Port Scan Attack |
2019-10-08 03:05:14 |
| 159.203.201.154 | attackspam | Port scan attempt detected by AWS-CCS, CTS, India |
2019-10-08 03:39:35 |
| 172.222.136.6 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-08 03:30:41 |
| 203.95.223.15 | attackbots | Automatic report - Port Scan Attack |
2019-10-08 03:28:18 |
| 51.77.156.223 | attackbots | Oct 7 20:48:57 meumeu sshd[8346]: Failed password for root from 51.77.156.223 port 36440 ssh2 Oct 7 20:53:18 meumeu sshd[9021]: Failed password for root from 51.77.156.223 port 60426 ssh2 ... |
2019-10-08 03:02:30 |
| 165.227.186.227 | attack | $f2bV_matches |
2019-10-08 03:03:39 |
| 117.90.1.229 | attack | Unsolicited bulk porn & phishing - varying ISPs (primarily Chinanet); repetitive redirects from blacklisted IP 92.63.192.124 & .151; spam volume up to 10/day. Unsolicited bulk spam - kyoritsu-kiko.co.jp, CHINANET jiangsu province network - 117.90.1.229 Spam link 1001blister.ru = 92.63.192.151 NVFOPServer-net (previous IP 92.63.192.124) - BLACKLISTED BY MCAFEE - repetitive redirects: - nicelocalchicks.com = 104.31.94.54, 104.31.95.54 Cloudflare - code.jquery.com = 209.197.3.24 (previous 205.185.208.52), Highwinds Network - t-r-f-k.com = 95.216.190.44, 88.99.33.187 Hetzner Online GmbH Sender domain thoger.net = 78.156.98.46 EnergiMidt Route |
2019-10-08 03:22:20 |
| 176.118.55.251 | attackbotsspam | postfix |
2019-10-08 03:25:09 |
| 139.199.45.83 | attack | Oct 7 02:28:45 sachi sshd\[18518\]: Invalid user Qwert123456 from 139.199.45.83 Oct 7 02:28:45 sachi sshd\[18518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 Oct 7 02:28:46 sachi sshd\[18518\]: Failed password for invalid user Qwert123456 from 139.199.45.83 port 57294 ssh2 Oct 7 02:33:43 sachi sshd\[18928\]: Invalid user Qwert123456 from 139.199.45.83 Oct 7 02:33:43 sachi sshd\[18928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 |
2019-10-08 03:04:34 |
| 132.145.170.174 | attackbotsspam | $f2bV_matches |
2019-10-08 03:26:10 |
| 94.125.61.225 | attackbots | Oct 7 14:36:27 h2177944 kernel: \[3327891.061362\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=94.125.61.225 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=58 ID=5840 DF PROTO=TCP SPT=49671 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 7 14:51:27 h2177944 kernel: \[3328791.497495\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=94.125.61.225 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=61 ID=39032 DF PROTO=TCP SPT=64820 DPT=465 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 7 15:10:32 h2177944 kernel: \[3329935.760445\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=94.125.61.225 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=54 ID=50437 DF PROTO=TCP SPT=55299 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 7 15:11:26 h2177944 kernel: \[3329990.147351\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=94.125.61.225 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=73 ID=59956 DF PROTO=TCP SPT=57170 DPT=465 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 7 15:14:52 h2177944 kernel: \[3330196.068463\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=94.125.61.225 DST=85.214 |
2019-10-08 03:36:03 |
| 145.239.87.109 | attackbotsspam | vps1:pam-generic |
2019-10-08 03:38:34 |
| 148.72.232.63 | attackspambots | xmlrpc attack |
2019-10-08 03:25:51 |
| 3.229.82.144 | attack | Message ID |
2019-10-08 03:25:37 |